Exploiting HMI in SCADA servers

In this section, we will discuss how we can test the safety of SCADA systems. We have plenty of frameworks that can test SCADA systems, but considering all of them will push us beyond the scope of this book. Therefore, to keep it simple, we will continue our discussion specific to SCADA HMI exploitation carried out using Metasploit only.

Get Mastering Metasploit - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.